Description

A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.

INFO

Published Date :

2025-01-22T04:55:30.649Z

Last Modified :

2026-04-24T11:31:00.808Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2024-11218 vulnerability.

Vendors Products
Redhat
  • Enterprise Linux
  • Openshift
  • Openshift Ironic
  • Rhel Aus
  • Rhel E4s
  • Rhel Eus
  • Rhel Tus
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-11218.

URL Resource
https://access.redhat.com/errata/RHSA-2025:0830 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:0878 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:0922 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:0923 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1186 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1187 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1188 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1189 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1207 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1275 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1295 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1296 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1372 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1453 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1707 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1713 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1908 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1910 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:1914 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2441 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2443 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2454 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2456 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2701 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2703 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2710 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:2712 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:3577 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:3798 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2024-11218 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2326231 cve-icon cve-icon
https://github.com/containers/buildah/pull/5918 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2024-11218 cve-icon
https://www.cve.org/CVERecord?id=CVE-2024-11218 cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact